Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that’s targeting Android and iOS platforms with fake dating, social […]
Category: Cybercriminals
“No honor among thieves”: M&S hacking group starts turf war
Genevieve Stark, head of cybercrime analysis at Google Threat Intelligence Group, said DragonForce could be attempting to attract RansomHub’s affiliates. […]
Cybercriminals turn to “residential proxy” services to hide malicious traffic
For years, gray market services known as “bulletproof” hosts have been a key tool for cybercriminals looking to anonymously maintain […]
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to […]
Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets
May 27, 2025Ravie LakshmananMalware / Cybersecurity Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising […]
Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions
Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to […]
Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
Feb 21, 2025Ravie LakshmananDark Web / Cybercrime The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying […]
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
Feb 20, 2025Ravie LakshmananCybercrime / Malware A malware campaign distributing the XLoader malware has been observed using the DLL side-loading […]
Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers
Feb 18, 2025Ravie LakshmananMalware / Website Hacking Cybersecurity researchers have flagged a credit card stealing malware campaign that has been […]
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
Feb 05, 2025Ravie LakshmananCybersecurity / Cloud Security Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) […]